Description
The WP-Members Membership Plugin plugin for WordPress is vulnerable to SQL Injection via the 'order_by' attribute of the [wpmem_user_membership_posts] shortcode in all versions up to, and including, 3.5.5.1. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2026-03-04
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection with potential data exfiltration
Action: Patch immediately
AI Analysis

Impact

WP-Members Membership Plugin for WordPress contains an SQL Injection flaw in the 'order_by' attribute of the [wpmem_user_membership_posts] shortcode. The defect arises from insufficient sanitization and lack of prepared statements, allowing an attacker to append arbitrary SQL to the query. If successful, the attacker can read sensitive database content. This weakness is classified as CWE-89.

Affected Systems

All versions of the WP-Members Membership Plugin up to and including 3.5.5.1 are affected. The plugin is distributed by cbutlerjr for the WordPress platform.

Risk and Exploitability

The vulnerability carries a CVSS score of 6.5, indicating moderate severity. The EPSS score is less than 1%, suggesting a low likelihood of current exploitation. The issue is not listed in the CISA KEV catalog. Exploitation requires the attacker to be authenticated with Contributor or higher privileges, so the attack vector is an authenticated web console user.

Generated by OpenCVE AI on April 15, 2026 at 23:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update WP-Members to a version newer than 3.5.5.1.
  • Restrict Contributor roles from using the vulnerable [wpmem_user_membership_posts] shortcode by disabling it or removing the 'order_by' attribute from their capabilities.
  • Audit and modify any existing usage of the shortcode to ensure the 'order_by' attribute is properly sanitized or remove it entirely.

Generated by OpenCVE AI on April 15, 2026 at 23:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Cbutlerjr
Cbutlerjr wp-members Membership Plugin
Wordpress
Wordpress wordpress
Vendors & Products Cbutlerjr
Cbutlerjr wp-members Membership Plugin
Wordpress
Wordpress wordpress

Wed, 04 Mar 2026 06:30:00 +0000

Type Values Removed Values Added
Description The WP-Members Membership Plugin plugin for WordPress is vulnerable to SQL Injection via the 'order_by' attribute of the [wpmem_user_membership_posts] shortcode in all versions up to, and including, 3.5.5.1. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title WP-Members Membership Plugin <= 3.5.5.1 - Authenticated (Contributor+) SQL Injection via 'order_by' Shortcode Attribute
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Cbutlerjr Wp-members Membership Plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:43:28.149Z

Reserved: 2026-02-11T18:12:18.867Z

Link: CVE-2026-2363

cve-icon Vulnrichment

Updated: 2026-03-04T15:04:18.622Z

cve-icon NVD

Status : Deferred

Published: 2026-03-04T07:16:14.277

Modified: 2026-04-22T21:26:58.303

Link: CVE-2026-2363

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T00:00:14Z

Weaknesses